Publications by authors named "YiShi Shi"

Based on the high random distribution characteristic of the natural speckle image, a new method of speckle visual cryptography, to the best of our knowledge, is designed by combining the natural speckle image with the secret key in visual cryptography. Specifically, we designed an authentication system for user credentials by combining speckle visual cryptography and the QR code. By using the speckle visual cryptography method, the image of the QR code carrying user authentication information is hidden in the speckle image, and the speckle image is printed on the paper credentials.

View Article and Find Full Text PDF

Optical hiding often requires the selection of specific artificial optical components as carriers, which results in poor versatility of the carriers and high costs for the hiding system. To conceal secret information on different surfaces such as metal, wood, and paper, we propose an optical information hiding method. In this method, we use images of surfaces, whose grayscale histograms have the characteristic of symmetric distribution.

View Article and Find Full Text PDF

We demonstrate a pre-chirp and gain jointly managed Yb-fiber laser that drives simultaneous label-free autofluorescence-multiharmonic (SLAM) medical imaging. We show that a gain managed Yb-fiber amplifier produces high-quality compressed pulses when the seeding pulses exhibit proper negative pre-chirp. The resulting laser source can generate 43-MHz, 34-fs pulses centered at 1110 nm with more than 90-nJ energy.

View Article and Find Full Text PDF

Slope-dependent error often occurs in the coherence scanning interferometry (CSI) measurement of functional engineering surfaces with complex geometries. Previous studies have shown that these errors can be corrected through the characterization and phase inversion of the instrument's three-dimensional (3D) surface transfer function. However, since CSI instrument is usually not completely shift-invariant, the 3D surface transfer function characterization and correction must be repeated for different regions of the full field of view, resulting in a long computational process and a reduction of measurement efficiency.

View Article and Find Full Text PDF

Low-dose imaging techniques have many important applications in diverse fields, from biological engineering to materials science. Samples can be protected from phototoxicity or radiation-induced damage using low-dose illumination. However, imaging under a low-dose condition is dominated by Poisson noise and additive Gaussian noise, which seriously affects the imaging quality, such as signal-to-noise ratio, contrast, and resolution.

View Article and Find Full Text PDF

Coherent modulation imaging (CMI) is a lessness diffraction imaging technique, which uses an iterative algorithm to reconstruct a complex field from a single intensity diffraction pattern. Deep learning as a powerful optimization method can be used to solve highly ill-conditioned problems, including complex field phase retrieval. In this study, a physics-driven neural network for CMI is developed, termed CMINet, to reconstruct the complex-valued object from a single diffraction pattern.

View Article and Find Full Text PDF

In this paper, a modified probabilistic deep learning method is proposed to attack the double random phase encryption by modeling the conditional distribution of plaintext. The well-trained probabilistic model gives both predictions of plaintext and uncertainty quantification, the latter of which is first introduced to optical cryptanalysis. Predictions of the model are close to real plaintexts, showing the success of the proposed model.

View Article and Find Full Text PDF

Coherent modulation imaging is a lensless imaging technique, where a complex-valued image can be recovered from a single diffraction pattern using the iterative algorithm. Although mostly applied in two dimensions, it can be tomographically combined to produce three-dimensional (3D) images. Here we present a 3D reconstruction procedure for the sample's phase and intensity from coherent modulation imaging measurements.

View Article and Find Full Text PDF

As a lensless imaging technique, ptychography provides a new way to resolve the conflict between the spatial resolution and the field of view. However, due to the pixel size limit of the sensor, a compromise has to be reached between the spatial resolution and the signal-to-noise ratio. Here, we propose a resolution-enhanced ptychography framework with equivalent upsampling and subpixel accuracy in position to further improve the resolution of ptychography.

View Article and Find Full Text PDF

The single-shot capability of coherent modulation imaging (CMI) makes it have great potential in the investigation of dynamic processes. Its main disadvantage is the relatively low signal-to-noise ratio (SNR) which affects the spatial resolution and reconstruction accuracy. Here, we propose the improvement of a general spatiotemporal CMI method for imaging of dynamic processes.

View Article and Find Full Text PDF

Reconstruction of a complex field from one single diffraction measurement remains a challenging task among the community of coherent diffraction imaging (CDI). Conventional iterative algorithms are time-consuming and struggle to converge to a feasible solution because of the inherent ambiguities. Recently, deep-learning-based methods have shown considerable success in computational imaging, but they require large amounts of training data that in many cases are difficult to obtain.

View Article and Find Full Text PDF

A concise and powerful method for dual-wavelength digital holography (DWDH) is proposed. By designing a new algorithm, this proposed method bypasses the phase synthesis process and directly obtains the thickness distribution of the object. This method can enlarge the range of measurement with strong noise resistance.

View Article and Find Full Text PDF

Structured illumination microscopy (SIM) is combined with optical image hiding for the first time, to the best of our knowledge. In a linear phase encoding system, secret information might be divulged with the input related to the correct image. In this paper, we propose an optical hiding method in which the concept of SIM is used to create reconstructed host images with an extended spectrum.

View Article and Find Full Text PDF

We propose an optical watermarking method based on a natural speckle pattern. In the watermarking process, the watermark information is embedded into the natural speckle pattern. Then the random-like watermarked image is generated with the proposed grayscale reordering algorithm.

View Article and Find Full Text PDF

In this paper, we propose a visual-cryptographic image hiding method based on visual cryptography (VC) and volume grating optics. The secret image is converted to the encrypted visual keys (VKs) according to the normal VC algorithm. Then the VKs are further embellished to the QR-code-like appearance and hidden as the holographic optical elements (HOEs), which are fabricated by the holographic exposure of photopolymer.

View Article and Find Full Text PDF

A novel optical encoding method based on single-shot ptychography is proposed for the application of optical watermarking. For the inherent properties of single-shot ptychography, the watermark is encoded into a series of tiny diffraction spots just in one exposure. Those tiny spots have high imperceptibility and compressibility, which are quite suitable for the optical watermarking application.

View Article and Find Full Text PDF

The well-known diffractive-imaging-based optical cryptosystem is breached in the paper. The decryption key of the system can be easily accessed by the opponent by using a new type of powerful phase retrieval method. Our result, to our best knowledge, is the first work to show the security risk of the diffractive-image cryptosystem.

View Article and Find Full Text PDF

We demonstrate a new analytic approach to a known-plaintext attack (KPA) on an optical cryptosystem based on the phase-shifting interferometry (PSI) technique. With the proposed analytic attack method, an opponent can access the exact decryption keys and obtain perfect attack results. This demonstration, to the best of our knowledge, shows for the first time that the optical cryptosystem based on the PSI technique is vulnerable to KPA.

View Article and Find Full Text PDF

The ptychographic scanning operation is introduced into digital holography to expand the field-of-view (FOV). An optical image encryption method based on this technique is further proposed and analyzed. The plaintext is moved sequentially in the way of ptychographic scanning and corresponding pairs of phase-shifted interferograms are recorded as ciphertexts.

View Article and Find Full Text PDF

Ptychography is combined with optical image encryption for the first time. Due to the nature of ptychography, not only is the interferometric optical setup that is usually adopted not required any more, but also the encryption for a complex-valued image is achievable. Considering that the probes overlapping with each other is the crucial factor in ptychography, their complex-amplitude functions can serve as a kind of secret keys that lead to the enlarged key space and the enhanced system security.

View Article and Find Full Text PDF

The information inevitably lost in multiple-image hiding is discarded in advance by the operation of prechoosing information before the hiding process; thus both fidelity and multiplexing capacity can be improved significantly. Various characters of each image provide a great many possibilities for information prechoosing. The ideal low-pass filter presented with the matched encoding and hiding procedure may be one of the simplest examples of information prechoosing for generally used images.

View Article and Find Full Text PDF

To avoid additive cross-talk among multiple images, they are separated from each other and even from the host image in the hiding and the extraction process by locating them independently in the Fresnel domain with computer-generated double phase-only masks. Gray images and white-ground and black-ground binary images can be hidden in the system at the same time. The hiding capacity of the system as to these three types of multiple image has also been investigated using a cascaded iterative algorithm.

View Article and Find Full Text PDF